BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
13
Global rank
17 infographic chevron month
Month rank
14 infographic chevron week
Week rank
2889
IOCs

Vidar is a dangerous malware that steals information and cryptocurrency from infected users. It derives its name from the ancient Scandinavian god of Vengeance. This stealer has been terrorizing the internet since 2018.

Trojan
Type
ex-USSR
Origin
1 December, 2018
First seen
26 July, 2024
Last seen

How to analyze Vidar with ANY.RUN

Type
ex-USSR
Origin
1 December, 2018
First seen
26 July, 2024
Last seen

IOCs

IP addresses
95.216.180.153
92.255.85.78
45.84.1.88
Hashes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https://t.me/armad2a
https://steamcommunity.com/profiles/76561199747278259
https://t.me/kjhjgsadsazxc
https://t.me/puffclou
https://steamcommunity.com/profiles/76561199735694209
https://steamcommunity.com/profiles/76561199743486170
https://t.me/s41l0
https://steamcommunity.com/profiles/76561199654112719
https://t.me/r2d0s
https://steamcommunity.com/profiles/76561199662282318
https://t.me/t8jmhl
http://prepepe.ac.ug/freebl3.dll
http://prepepe.ac.ug/softokn3.dll
http://prepepe.ac.ug/sqlite3.dll
http://prepepe.ac.ug/vcruntime140.dll
http://prepepe.ac.ug/msvcp140.dll
http://prepepe.ac.ug/mozglue.dll
http://prepepe.ac.ug/nss3.dll
http://pretorian.ac.ug/index.php
http://anstransport.com/cgi-sys/suspendedpage.cgi
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 176
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1007
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 2980
comments 0

What is Vidar malware?

Vidar is an information stealer trojan that was first identified in December 2018. It is either a fork of Arkei or the result of its evolution. Named after the god of vengeance from Scandinavian mythology, Vidar is used to steal information from infected systems, take screenshots, steal cryptocurrency, and more.

General description of Vidar malware

Vidar is presumed to have originated in a Russian-speaking country since the malware is configured to stop execution if it detects that it is being run on a machine that is located in one of the ex-USSR nations or on one that has a Russian keyboard layout.

Being another cyber threat that is available for purchase based on the MaaS (Malware-as-a-Service) business model, Vidar can be purchased on its “official” website for a hefty price tag of $700, at least for the PRO version. Though, a stripped-down version of the malware can be obtained for just $250.

According to the Vidar trojan analysis, malware is written in the C++ programming language. Purchasing account grants the attacker access to a control panel where the cybercriminal can set up the infostealer malware to target particular information on the victims’ PC. Like Arkei, cybercriminals need to take precautions to secure the main payload themselves, using crypto or a packer. The control panel displays the current builder version, user settings, malware status, and logs. It should be noted that Vidar data stealer uses domain names to search for C&C servers, where stolen data is being dropped, changing every four days. Though they are steadily changing, a constant response is required.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Vidar is capable of stealing text files in multiple formats, browser cookies and history, browser records, including data from TOR, as well as autofill value information, including banking and credit card details. Based on the Vidar analysis, the stealer malware can search for cryptocurrency wallet information, take screenshots and act as a message stealer, recording private messages from various software.

What’s more, Vidar is also known to be able to steal digital coins from offline wallets. In fact, holders of Litecoin, Bitcoin, Ethereum, Zcash, and DashCore are in potential danger, as these are the cryptocurrencies currently supported by this infostealer malware.

After collecting all targeted information, this stealer malware archives it and sends the stolen data to a control server, after which Vidar removes traces of its work and deletes itself from the system.

Vidar analysis

An analysis recorded in ANY.RUN malware hunting service allows us to take a closer look at the lifecycle of Vidar and perform Vidar analysis.

arkei execution process tree

Figure 1: A visual process graph generated by ANY.RUN

text report of the arkei malware analysis

Figure 2: The customizable text report provided by ANY.RUN is a perfect tool to share the results of an analysis

Vidar execution process

According to the Vidar analysis, after the user downloads and runs a malicious file, it spawns a child process and collects information from the infected system. Often, after the information was collected, the malware kills and deletes itself from the system through a command-line command.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

How to avoid infection by Vidar malware?

When spread via spam email campaigns like NanoCore or Agent Tesla, the Vidar stealer requires the user to download and run a malicious file to enter an active state and begin execution. Therefore, following some basic cybersecurity rules can ensure that users will stay safe from Vidar malware and the incident response team will work effectively.

As such, users should be careful when downloading attachments in emails from unknown senders. The best practice is to avoid downloading such files altogether, therefore not putting oneself in danger at all.

In addition, downloading only licensed software from trustworthy sources and avoiding gaming hacking clients greatly reduced the risk of being infected with malware such as Vidar trojan, which uses these attack vectors to infect victims.

The distribution process of Vidar

According to the Vidar trojan analysis, Vidar is distributed through spam email campaigns as a malicious attachment, like other malware. In addition, cases of Vidar being distributed using shady software and gaming hack clients have also been recorded. Vidar infostealer targets users all over the world, except some ex-USSR countries, including Russia.

How to detect Vidar using ANY.RUN?

Some malware creates files in which it named itself. You can find such info about Vidar trojan using ANY.RUN's Static Discovering during your Vidar analysis. Open either the "Files" tab in the lower part of the task's window or click on the process and then on the "More Info" button in the appeared window. After that, all you need to do is click on the file.

arkei vidar log file Figure 3: Vidar's log file

Conclusion

Vidar is a hazardous information stealer trojan, distributed as malware as a service. Thanks to its extensive stealer feature set, Vidar trojan can be used to retrieve a wide variety of information, including stealing select cryptocurrency coins from the users. Additionally, Vidar is capable of stealing data from TOR.

Thankfully, malware hunting services like ANY.RUN allows researchers to conduct extensive studies of malware samples in a secure environment, allowing them to spread information about the danger and develop effective countermeasures and incident response.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More